Skip to content

Commit e3684fb

Browse files
authored
fix(deps): update DA dependencies(#554)
1 parent 40cf520 commit e3684fb

File tree

13 files changed

+84
-419
lines changed

13 files changed

+84
-419
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ This module is used to create an IBM Cloud Event Notifications instance to filte
1515
* [Submodules](./modules)
1616
* [fscloud](./modules/fscloud)
1717
* [Examples](./examples)
18+
* [Advanced example with BYOK encryption and CBR rules](./examples/advanced)
1819
* [Basic example](./examples/basic)
19-
* [Complete example with BYOK encryption and CBR rules](./examples/complete)
2020
* [Financial Services Cloud profile example](./examples/fscloud)
2121
* [Contributing](#contributing)
2222
<!-- END OVERVIEW HOOK -->
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
# Complete example with BYOK encryption and CBR rules
1+
# Advanced example with BYOK encryption and CBR rules
22

33
An end-to-end example that creates the following infrastructure:
44

55
- A resource group, if one is not passed in.
66
- A Key Protect instance with a root key.
77
- An Event Notifications instance with bring-your-own-key encryption.
8-
- An IBM Cloud Object Storage service instance and bucket to collect events that fail delivery.
9-
- A Virtual Private Cloud (VPC).
108
- Service credentials for the Event Notifications instance.
9+
- An IBM Cloud Object Storage service instance and bucket to collect events that fail delivery.
10+
- An Event Notifications webhook destination, topic and subscription.

examples/complete/main.tf renamed to examples/advanced/main.tf

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,19 @@ module "event_notification" {
7070
tags = var.resource_tags
7171
access_tags = var.access_tags
7272
service_endpoints = "public"
73-
service_credential_names = var.service_credential_names
74-
region = var.region
73+
service_credential_names = {
74+
"en_manager" : "Manager",
75+
"en_writer" : "Writer",
76+
"en_reader" : "Reader",
77+
"en_channel_editor" : "Channel Editor",
78+
"en_device_manager" : "Device Manager",
79+
"en_event_source_manager" : "Event Source Manager",
80+
"en_event_notifications_publisher" : "Event Notification Publisher",
81+
"en_status_reporter" : "Status Reporter",
82+
"en_email_sender" : "Email Sender",
83+
"en_custom_email_status_reporter" : "Custom Email Status Reporter",
84+
}
85+
region = var.region
7586
# COS Related
7687
cos_integration_enabled = true
7788
cos_bucket_name = module.cos.bucket_name
File renamed without changes.
File renamed without changes.

examples/complete/variables.tf renamed to examples/advanced/variables.tf

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -44,20 +44,3 @@ variable "region" {
4444
description = "IBM Cloud region where event notification will be created, supported regions are: us-south (Dallas), eu-gb (London), eu-de (Frankfurt), au-syd (Sydney), eu-es (Madrid)"
4545
default = "us-south"
4646
}
47-
48-
variable "service_credential_names" {
49-
description = "Map of name, role for service credentials that you want to create for the event notification"
50-
type = map(string)
51-
default = {
52-
"en_manager" : "Manager",
53-
"en_writer" : "Writer",
54-
"en_reader" : "Reader",
55-
"en_channel_editor" : "Channel Editor",
56-
"en_device_manager" : "Device Manager",
57-
"en_event_source_manager" : "Event Source Manager",
58-
"en_event_notifications_publisher" : "Event Notification Publisher",
59-
"en_status_reporter" : "Status Reporter",
60-
"en_email_sender" : "Email Sender",
61-
"en_custom_email_status_reporter" : "Custom Email Status Reporter",
62-
}
63-
}
File renamed without changes.

examples/fscloud/README.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,7 @@ The example uses the IBM Cloud Terraform provider to create the following infras
77
- A resource group, if one is not passed in.
88
- An IAM authorization between all Event Notification instances in the given resource group and the KMS instance that is passed in.
99
- An Event Notification instance that is encrypted with the KMS root key that is passed in.
10-
- A sample virtual private cloud (VPC).
11-
- A context-based restriction (CBR) rule to only allow Event Notification to be accessible from VPC and Schematics.
10+
- A context-based restriction (CBR) rule to only allow Event Notification to be accessible Schematics.
1211

1312
:exclamation: **Important:** In this example, only the Event Notification instance complies with the IBM Cloud Framework for Financial Services. Other parts of the infrastructure do not necessarily comply.
1413

examples/fscloud/main.tf

Lines changed: 2 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -18,38 +18,9 @@ data "ibm_iam_account_settings" "iam_account_settings" {
1818
}
1919

2020
##############################################################################
21-
# VPC
22-
##############################################################################
23-
resource "ibm_is_vpc" "example_vpc" {
24-
name = "${var.prefix}-vpc"
25-
resource_group = module.resource_group.resource_group_id
26-
tags = var.resource_tags
27-
}
28-
29-
resource "ibm_is_subnet" "testacc_subnet" {
30-
name = "${var.prefix}-subnet"
31-
vpc = ibm_is_vpc.example_vpc.id
32-
zone = "${var.region}-1"
33-
total_ipv4_address_count = 256
34-
resource_group = module.resource_group.resource_group_id
35-
}
36-
37-
##############################################################################
38-
# Create CBR Zone
21+
# Create CBR Zone for Schematics
3922
##############################################################################
4023

41-
module "cbr_vpc_zone" {
42-
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
43-
version = "1.33.2"
44-
name = "${var.prefix}-VPC-network-zone"
45-
zone_description = "CBR Network zone representing VPC"
46-
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
47-
addresses = [{
48-
type = "vpc",
49-
value = ibm_is_vpc.example_vpc.crn
50-
}]
51-
}
52-
5324
module "cbr_zone_schematics" {
5425
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
5526
version = "1.33.2"
@@ -132,20 +103,10 @@ module "event_notification" {
132103
cos_endpoint = "https://${module.cos.buckets[local.bucket_name].s3_endpoint_direct}"
133104
cbr_rules = [
134105
{
135-
description = "${var.prefix}-event notification access from vpc and schematics"
106+
description = "${var.prefix}-event notification access from schematics"
136107
enforcement_mode = "enabled"
137108
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
138109
rule_contexts = [{
139-
attributes = [
140-
{
141-
name = "endpointType",
142-
value = "private"
143-
},
144-
{
145-
name = "networkZoneId"
146-
value = module.cbr_vpc_zone.zone_id
147-
}]
148-
}, {
149110
attributes = [
150111
{
151112
name = "endpointType",

0 commit comments

Comments
 (0)